Undecidability in Binary Tag Systems and the Post Correspondence Problem for Five Pairs of Words

Size: px
Start display at page:

Download "Undecidability in Binary Tag Systems and the Post Correspondence Problem for Five Pairs of Words"

Transcription

1 Undecidability in Binary Tag Systems and the Post Correspondence Problem for Five Pairs of Words Trlogh Neary Institte of Neroinformatics, University of Zürich and ETH Zürich, Switzerland Abstract Since Cocke and Minsky proved 2-tag systems niversal, they have been extensively sed to prove the niversality of nmeros comptational models. Unfortnately, all known algorithms give niversal 2-tag systems that have a large nmber of symbols. In this work, tag systems with only 2 symbols (the minimm possible) are proved niversal via an intricate constrction showing that they simlate cyclic tag systems. We immediately find applications of or reslt. We redce the halting problem for binary tag systems to the Post correspondence problem for 5 pairs of words. This improves on 7 pairs, the previos bond for ndecidability in this problem. Following or reslt, only the cases for 3 and 4 pairs of words remains open, as the problem is known to be decidable for 2 pairs. In a frther application, we apply the redctions of Vesa Halava and others to show that the matrix mortality problem is ndecidable for sets with six 3 3 matrices and for sets with two matrices. The previos bonds for the ndecidability in this problem was seven 3 3 matrices and two matrices ACM Sbject Classification F.1.2 [Theory of Comptation]: Comptation by Abstract Devices Modes of Comptation Keywords and phrases tag system, Post correspondence problem, ndecidability Digital Object Identifier /LIPIcs.STACS Introdction Introdced by Post [17], tag systems have been sed to prove Tring niversality in nmeros comptational models, inclding some of the simplest known niversal systems [6, 10, 11, 14, 19, 20, 21]. Many niversality reslts rely either on direct simlation of tag systems or on a chain of simlations the leads back to tag systems. Sch relationships between models means that improvements in one model often has applications to many others. The reslts in [23] are a case in point, where an exponential improvement in the time efficiency of tag systems had the domino effect of showing that many of the simplest known models of comptation [6, 10, 11, 14, 19, 20, 21] are in fact polynomial time simlators of Tring machines. Despite being central to the search for simple niversal systems for 50 years, tag systems have not been the sbject of simplification since the sixties. In 1961, Minsky [13] solved Post s longstanding open problem by showing that tag systems, with deletion nmber 6, are niversal. Soon after, Cocke and Minsky [5] proved that tag systems with deletion nmber 2 (2-tag systems) are niversal. Later, Hao Wang [22] showed that 2-tag systems with even shorter instrctions were niversal. The systems of both Wang, and Cocke and Minsky se large alphabets and so have a large nmber of rles. Here we show that tag systems with only 2 symbols, and ths only 2 rles, are niversal. Srprisingly, one of or two rles is trivial. We find immediate applications of or reslt. Using Cook s [6] redction of tag systems to cyclic tag systems, it is a straightforward matter Trlogh Neary; licensed nder Creative Commons License CC-BY 32nd Symposim on Theoretical Aspects of Compter Science (STACS 2015). Editors: Ernst W. Mayr and Nicolas Ollinger; pp Leibniz International Proceedings in Informatics Schloss Dagsthl Leibniz-Zentrm für Informatik, Dagsthl Pblishing, Germany

2 650 Undecidability in Binary Tag Systems and the Post Correspondence Problem to give a binary cyclic tag system program that is niversal and contains only two 1 symbols. We also se or binary tag system constrction to improve the bond for the nmber of pairs of words for which the Post correspondence problem [18] is ndecidable, and the bonds for the simplest sets of matrices for which the mortality problem [16] is ndecidable. The search for the minimm nmber of word pairs for which the Post correspondence problem is ndecidable began in the 1980s [4]. The best reslt ntil now was fond by Matiyasevich and Sénizerges, whose impressive 3-rle semi-the system [12], along with a redction de to Clas [4], showed that the problem is ndecidable for 7 pairs of words. Improving on this ndecidability bond of 7 pairs of words seemed like a challenging problem. In fact, Blondel and Tsitsiklis [2] stated in their srvey The decidability of the intermediate cases (3 n 6) is nknown bt is likely to be difficlt to settle. We give the first improvement on the bond of Matiyasevich and Sénizerges in 17 years: We redce the halting problem for or binary tag system to the Post correspondence problem for 5 pairs of words. This leaves open only the cases for 3 and 4 pairs of words, as the problem is known to be decidable for 2 pairs [7]. A nmber of athors [1, 3, 8, 9, 16], have sed ndecidability bonds for the Post correspondence problem to find simple matrix sets for which the mortality problem is ndecidable. The matrix mortality problem is, given a set of d d integer matrices, decide if the zero matrix can be expressed as a prodct of matrices from the set. Halava et al. [9] proved the mortality problem ndecidable for sets with seven 3 3 matrices, and sing a redction de Cassaigne and Karhmäki [3] they also showed the problem ndecidable for sets with two matrices. Applying the redctions sed in [3, 8] to or new bond, we find that the matrix mortality problem is ndecidable for sets with six 3 3 matrices and for sets with two matrices. In the seqel while simlating cyclic tag systems or binary tag system prodces garbage that grows exponentially dring the simlation, and this reslts in an exponential time simlation overhead. 2 Preliminaries We write c 1 c 2 if a configration c 2 is obtained from c 1 via a single comptation step. We let c 1 t c 2 denote a seqence of t comptation steps. The length of a word w is denoted w, and ɛ denotes the empty word. We let v denote the encoding of v, where v is a symbol or a word. We se the binary modlo operation a = m mod n, where a = m ny, 0 a < n, and a, m, n, and y are integers. 2.1 Tag Systems Definition 1. A tag system consists of a finite alphabet of symbols Σ, a finite set of rles R : Σ Σ and a deletion nmber β N, β 1. The tag systems we consider are deterministic. The comptation of a tag system acts on a word w = w 0 w 1... w w 1 (here w i Σ) which we call the dataword. The entire configration is given by w. In a comptation step, the symbols w 0 w 1... w β 1 are deleted and we apply the rle for w 0, i.e. a rle of the form w 0 w 0,1 w 0,2... w 0,e, by appending the word w 0,1 w 0,2... w 0,e (here w 0,j Σ). A dataword (configration) w is obtained from w via a single comptation step as follows: w 0 w 1... w β... w w 1 w β... w w 1 w 0,1 w 0,2... w 0,e

3 T. Neary 651 where w 0 w 0,1 w 0,2... w 0,e R. A tag system halts if w < β. We se the term rond to describe the w w β or β comptation steps that traverse a word w exactly once. We say a symbol w 0 is read if and only if at the start of a comptation step it is the leftmost symbol (i.e. the rle w 0 w 0,0 w 0,1... w 0,e is applied), and we say a word w = w 0 w 1... w w 1 is entered with shift z < β if w z is the leftmost symbol that is read in w. We let w denote the word obtained by removing the leftmost z symbols of w (i.e. w = [z] [z] w z... w w 1 ) and let w [z] denote the seqence of symbols read dring a single rond on w [z]. So w = w [z] zw z+β w z+2β w z+3β,..., w z+lβ where z + lβ < w. If z < β then w is read when w [z] is entered with shift z and we call w track z of w. A word w has a shift change of 0 s < β [z] if w = yβ s where y N and y > 0. The proof of Lemma 2 is left to the reader. Lemma 2 (shift change). Given a tag system T with deletion nmber β and the word rv Σ, where the word r has a shift change of s and v β, after one rond of T on r entered with shift z the word v is entered with shift (z + s) mod β. 2.2 Cyclic Tag Systems Cyclic tag systems were introdced and proved niversal by Cook [6]. Definition 3. A cyclic tag system C = α 0,..., α p 1 is a list of words α i {0, 1 called appendants. A configration of a cyclic tag system consists of (i) a marker that points to a single appendant α m in C, and (ii) a word w = w 1... w w {0, 1. We call w the dataword. Intitively the list C is a program with the marker pointing to instrction α m. In the initial configration the marker points to appendant α 0 and w is the binary inpt word. Definition 4. A comptation step is deterministic and acts on a configration in one of two ways: If w 1 = 0 then w 1 is deleted and the marker moves to appendant α (m+1 mod p). If w 1 = 1 then w 1 is deleted, the word α m is appended onto the right end of w, and the marker moves to appendant α (m+1 mod p). A cyclic tag system completes its comptation if (i) the dataword is the empty word or (ii) it enters a repeating seqence of configrations. As an example we give first 5 steps of the cyclic tag system C = 001, 01, 11 on the inpt word 101. In each configration C is given on the left with the marked appendant highlighted in bold font. 001, 01, , 01, , 01, , 01, , 01, , 01, The Halting Problem for Binary Tag Systems Definition 5 (Halting problem for binary tag systems). Given a 2-symbol tag system T with deletion nmber β and a dataword w, does T prodce a seqence of comptation steps of the form w w where w < β? Theorem 6. The halting problem for binary tag systems is ndecidable. The proof of Theorem 6 proceeds in two stages. First we constrct a non-halting binary tag system T C that simlates an arbitrary cyclic tag system C (Sections 3.1 and 3.2). Following this in Lemma 9 we show how to modify or constrction so that when simlating the cyclic tag system in [15] or system halts if an only if it is simlating a halting Tring machine. S TAC S

4 652 Undecidability in Binary Tag Systems and the Post Correspondence Problem Table 1 Table defining. In the middle colmn is the seqence of symbols (track) read in when the object in the left colmn is entered with shift (β 4m) mod β, where β = 4p is the deletion nmber, α m is a cyclic tag system appendant, and σ i is a binary word where σ i = bbcbb if σ i = 0, and σ i = bbbcb if σ i = 1. Also σ 1 is the word σ 1 with its leftmost symbol removed. Object Track read in Vales for m and α m ɛ = bbbb [(β 4m) mod β] = cs 0 m < p [β 1] = cbbb(bcbbb)p 1 c s 5p+1 m = 0 [β 4m 1] = cs 0 < m < p 0 = bbbb [β 2] = cbbb(bcbbb)p 1 c s 5p+1 m = 0 [β 4m 2] = cs 0 < m < p 1 = bbbb [β 3] = cbbb(bcbbb)p 1 c s 5p+1 α 0 = ɛ, m = 0 [β 3] σ1 σ 2... σ v c s 5v+1 α 0 = σ 1σ 2... σ v for v > 0, m = 0 [β 4m 3] = σ1 σ 2... σ v c s 5v α m = σ 1σ 2... σ v for 0 < m < p 3.1 Binary Tag System T C and Its Encoding Here we give a binary tag system T C that simlates the comptation of an arbitrary C = α 0,..., α p 1. The deletion nmber of T C is β = 4p, its alphabet is {b, c, and its rles are of the form b b and c, where {b, c. The binary word encodes the entire program of C and is defined by Table 1, where = βs, s 5(max(p, r)) and r is the length of the longest appendant in C. See Section for an example of how Table 1 is sed to give. The cyclic tag system symbols 0 and 1 are encoded as the binary words 0 = bbbb and 1 = bbbb respectively. We refer to 0 and 1 as objects. Definition 7 (Inpt to T C ). An arbitrary inpt dataword w 1 w 2... w n {0, 1 to a cyclic tag system is encoded as the T C inpt dataword w 1 w 2... w n. Dring the simlation we make se of an extra garbage object: the binary word ɛ = bbbb. The cyclic tag system configration (α 0, α 1... α m 1 α m α m+1... α p 1 w 1 w 2... w l ) is encoded as w 1 { ɛ p, w 2 { ɛ p, w 3... { ɛ p, w l { ɛ p, (1) [(β 4m) mod β] where w 1 [(β 4m) mod β] denotes the word given by an object w 1 { 0, 1 with its leftmost [β 4m) mod β] symbols deleted. This implies that w 1 is entered with the shift [(β 4m) mod β] and this shift vale records that the crrently marked cyclic tag system appendant is α m. If a sbword in the dataword of T C does not form part of one of the three objects 0, 1 and ɛ we will refer to this sbword as a garbage object. So words of the form { ɛ, in Eqation (1) consist only of garbage objects. 3.2 The Simlation Algorithm The seqence of symbols that is read in an object is determined by the shift vale with which it is entered (see Section 2.1). So in the simlation the shift vale is sed for algorithm

5 T. Neary 653 (i) 1 a 2 a 3... a l s a 2 a 3... a l σ 1 σ 2... σ v s 5v [β 4m] [(β 4(m+1)) mod β] (ii) 0 a 2 a 3... a l s a 2 a 3... a l s [β 4m] [(β 4(m+1)) mod β] (iii) (iv) ɛ a 2 a 3... a l s a 2 a 3... a l s [β 4m] [(β 4(m+1)) mod β] a 2 a 3... a l s a 2 a 3... a l s [(β 4m) mod β] [(β 4m) mod β] Figre 1 Objects 1, 0, ɛ and being read when entered with shift [β 4m]. Above s denotes the s comptation steps that read each object, a i {, 0, 1, ɛ, β = 4p is the deletion nmber, and p is the length of C s program. In (i), (ii) and (iii) 0 < m < p and in (iv) 0 m < p. On the left is the dataword before the object is read and on the right is the dataword after the object has been read. After 1, 0 or ɛ is read the adjacent object a 2 is entered with shift [β 4(m + 1)], and in (iv) after is read a 2 is entered with shift [(β 4m) mod β]. Reading the objects 0, ɛ or appends s, and reading the object 1 appends the encoding of cyclic tag system appendant α m = σ 1σ 2... σ v. control flow. Figres 1 and 2 give a high level view of reading each of the for objects that appear in Eqation (1) and this view incldes the shift change that occrs from reading each object. Objects 1, 0 and ɛ have length 1 = 0 = ɛ = βs + 4 and so have a shift change of β 4 (see end of Section 2.1). So when these objects are entered with shift [(β 4m) mod β] the adjacent object a 2 is entered with shift [(β 4(m + 1)) mod β] (as shown in Figres 1 and 2). When reading 1 or 0 this shift change of β 4 simlates the appendant marker moving from appendant α m to α ((m+1) mod p). Recall that β = 4p and so reading p of the 0 and 1 objects has a shift change of 0 (since 0 = p(β 4) mod β). This shift change of 0 means that the encoding of the marked appendant retrns to its original vale after reading p objects, correctly simlating that the appendant marker beginning at α m has moved throgh the entire length p circlar program of C and retrned to it original position of marking α m. The garbage objects ɛ and in Eqation (1) appear only in garbage words of the form { ɛ p, which have a shift change of 0 (since ɛ p = (1 + ps)β and = βs) and so have no effect on the shift vale when entering sbseqent objects (see Lemma 2). In Figres 1 and 2 we see that reading an 1 simlates reading a 1 by appending the encoding of the marked appendant α m = σ 1 σ 2... σ v and reading an 0 simlates reading a 0 by appending a garbage word from { ɛ p, to simlate that nothing is appended. In Figres 1 and 2 when the garbage objects ɛ and are read they append garbage words from { ɛ p, that have no effect on the simlation. To help the reader, in Section 3.3 we define for a specific example and se this vale to give an example of or algorithm simlating a cyclic tag system comptation step. Here we explain how Table 1 defines so that when each object is read it appends the appendants shown in Figres 1 and 2. Recall that a track w is the seqence of symbols read in a word w [z] when it is entered with shift z (see Section 2.1). Table 1 defines by giving (in the middle colmn) each possible track in (for detailed example see Section 3.3.1). Each track is read when the object in the left colmn of Table 1 is entered with shift [(β 4m) mod β]. To see this note that the nmber of b symbols that proceed the word in each object cases a shift change which in trn cases the track given in middle colmn of Table 1 to be read. For example the word bbb at the left end of 1 = bbbb has a shift change vale of β 3 (see Section 2.1) and ths when 1 is entered with shift [(β 4m) mod β] we enter with shift [β 4m 3]. So when m > 0 and we read an 1, we see from row 8 of Table 1 that track = σ [β 4m 3] 1 σ 2... σ v c s 5v is read. Applying the rles S TAC S

6 654 Undecidability in Binary Tag Systems and the Post Correspondence Problem (i) 1 a 2 a 3... a l s+1 a 2 a 3... a l σ 1 σ 2... σ v s 5v+1 [0] [β 4] (ii) 0 a 2 a 3... a l s+1 a 2 a 3... a l ɛ p s 5p+1 [0] [β 4] (iii) ɛ [0] a 2 a 3... a l s+1 a 2 a 3... a l ɛ p s 5p+1 [β 4] Figre 2 Objects 1, 0 and ɛ being read when entered with shift 0. Above s+1 denotes the s + 1 comptation steps that read each object when entered with shift 0. Here a i {, 0, 1, ɛ, β = 4p is the deletion nmber, and p is the length of C s program. On the left is the dataword before the object is read and on the right is the dataword after the object has been read. After 1, 0 or ɛ is read the adjacent object a 2 is entered with shift [β 4]. Reading the objects 0 or ɛ appends ɛ p s 5p+1, and reading the object 1 appends the encoding of cyclic tag system appendant α 0 = σ 1σ 2... σ v. b b and c when reading this track appends the appendant σ 1 σ 2... σ v c s 5v as shown in Figre 1 (i). For m > 0 the entire seqence of symbol read in 1, 0, and ɛ are respectively given by the tracks in rows 3, 5 and 8 of Table 1. One can see that applying the rles b b and c to these tracks appends the correct appendant for each object read in Figre 1. For m = 0 we have a special case where to get the entire seqence of symbols read in each object we prepend an extra b to the tracks given in rows 2, 4, 6 and 7 of Table 1 and now applying the rles b b and c to this seqence appends the appendants shown in Figre 2. For example, to give the seqence read in 1 when m = 0, we prepend b to track = σ [β 3] 1 σ 2... σ v c s 5v+1 (row 7 of Table 1) to give the seqence b σ 1 σ 2... σ v c s 5v+1 = σ 1 σ 2... σ v c s 5v+1 which appends the word σ 1 σ 2... σ v c s 5v+1 as shown in Figre 2 (i). Finally, in row 1 of Table 1 are the tracks that give the seqence of symbols read in garbage objects for all vales of m Tag system T C Simlating an Arbitrary Comptation Step of C Eqation (2) gives an arbitrary comptation step of cyclic tag system C, where w = σ 1... σ v if w 1 = 1 and α m = σ 1 σ 2... σ v, and w = ɛ if w 1 = 0. α 0,...α α m α m+1... α p 1 w 1 w 2... w l α 0,... α m α m+1... α p 1 w 2... w l w (2) Lemma 8 essentially states that T C simlates the arbitrary comptation step given in Eqation (2). In Lemma 8, Eqations (3) and (4) respectively encode the left and right configrations in Eqation (2) (see Eqation (1)). Lemma 8 (T C simlates an arbitrary comptation step of C). Given a dataword of the form w 1 { ɛ p, w 2 { ɛ p, w 3... { ɛ p, w l { ɛ p, (3) [(β 4m) mod β] where w i {0, 1, T C reads the word w 1 { ɛ p, to give a dataword of the form [(β 4m) mod β] w 2 { ɛ p, w 3... { ɛ p, w l { ɛ p, w { ɛ p, (4) [(β 4(m+1)) mod β] where w = σ 1 σ 2... σ v if w 1 = 1 and α m = σ 1 σ 2... σ v, and w = ɛ if w 1 = 0.

7 T. Neary 655 Proof. We se Figres 1 and 2 to verify that given Configration (3), T C prodces Configration (4). Following this we discss the correctness of Figres 1 and 2. From (i) and (ii) of Figres 1 and 2 there are 4 possible cases for reading w 1, where each case is determined by the vale of w 1 { 1, 0 and the shift ([0] or [β 4m] for m > 0) with which it is entered. The techniqe for verifying that T C prodces Configration (4) from Configration (3) is similar for all 4 cases and so we will only go throgh one case. We choose the case where w 1 = 1 and is entered with shift [β 4m] for m > 0. From Figre 1 (i) when we read w 1 = 1 with shift [β 4m] in Configration (3) we get { ɛ p, w 2 { ɛ p, w 3... { ɛ p, w l { ɛ p, σ 1 σ 2... σ v s 5v (5) [(β 4(m+1) mod β] In Configration (5) the word { ɛ p, is entered with shift [(β 4(m + 1) mod β]. Each ɛ has a shift change of β 4 and each has a shift change of 0, and so as we read the word { ɛ p, the ɛ and objects are entered with shifts of the form [(β 4m ) mod β] where 0 m < p. So the cases for reading the objects in the word { ɛ p, are given by (iii) in Figres 1 and 2 and (iv) in Figre 1. Ths when we read the word { ɛ p, at the left end of Configration (5) we append a word of the form { ɛ p, as shown in Configration (6). Recall that words of the form { ɛ p, have a shift change of [0] and so when we enter { ɛ p, with shift [β 4(m + 1) mod β] as shown in Configration (5) we also enter the adjacent object w 2 with shift [β 4(m + 1) mod β] as shown in Configration (6). w 2 { ɛ p, w 3... { ɛ p, w l { ɛ p, σ 1... σ v s 5v { ɛ p, (6) [(β 4(m+1) mod β] Configration (6) is of the form of Configration (4) for the case where w 1 = 1 and is entered with shift [(β 4m) mod β] for m > 0. So for this case we have shown sing Figres 1 and 2 that given Configration (3) T C prodces Configration (4). The correctness of Figres 1 and 2 can be verified by showing that on each line of these figres, reading the leftmost object in the configration on the left prodces the configration on the right. This is achieved by showing that when we enter the adjacent object a 2 with the correct shift and also that the correct word gets appended at the end of the dataword. The shift vale with which a 2 is entered follows immediately from Lemma 2 and the length of the object being read. We direct the reader to paragraph 2 of Section 3.2 where we explain how Table 1 defines so that when each object is read it appends the appendants shown in Figres 1 and 2. Or first main Theorem (Theorem 6) follows from Lemma 9. For tag system T C in Lemma 9 we restrict the type of inpt allowed as this lets s simlate T C in Theorem 11 when proving the Post correspondence problem ndecidable for 5 pairs of words. Lemma 9. Let T C be an arbitrary binary tag system with deletion nmber β, alphabet {b, c and rles of the form b b and c l b ( i {b, c). The halting problem is ndecidable for tag systems of the form of T C when given β 1 β... l b as inpt. Proof. In [15] the cyclic tag system C simlates the comptation of an arbitrary Tring machine and appends an appendant (which we will call α h ) encoding the Tring machine halt state if and only if the simlated Tring machine halts. So given the cyclic tag system C, its inpt w 1 w 2... w n, and an appendant α h, we constrct a binary tag system T C that takes β 1 β... l b as inpt and simlates C on inpt w halting if an only if C appends α h. It then follows that halting problem is ndecidable for tag systems of the form of T C when given β 1 β... l b as inpt. S TAC S

8 656 Undecidability in Binary Tag Systems and the Post Correspondence Problem Table 2 Table defining for tag system in Lemma 9. In the middle colmn is the seqence of symbols (or track) read in when the object in the left colmn is entered with shift [(β 10m + 1) mod β], where β = 10p is the deletion nmber, α m is a cyclic tag system appendant, ɛ = b 4 cb 6, and σ i = b 6 cb 4 if σ i = 0, and σ i = b 8 cb 2 if σ i = 1. Also ɛ and σ 1 are the words ɛ and σ 1 with their leftmost symbol removed. Object Track read in Vales for m and α m inpt track [β 1] bβ 2 w 1... w n s 11(n+p) β+2 ( ɛ ) p [(β 10m+1) mod β] cs 0 m < p ɛ = b 4 b 6 ( ɛ ) p 1 c s 11p+1 [β 3] m = 0 [β 10m 3] ( ɛ ) p c s 11p 0 < m < p 0 = b 6 b 4 ( ɛ ) p 1 c s 11p+1 [β 5] m = 0 [β 10m 5] ( ɛ ) p c s 11p 0 < m < p 1 = b 8 b 2 [β 7] σ1 σ 2... σ v c s 11v+1 α 0 = σ 1... σ v, m = 0 halting tracks = [β 10m 7] σ1 σ 2... σ v c s 11v = [β 10h 7] bs 1 = [2i] bs α m = σ 1... σ v, 0 < m < p, m h i = {0, 1, 2, 3,... β 2 2 We obtain T C by modifying tag system T C from Section 3.1. In T C, is defined by Table 2 and we have 0 = b 6 b 4, ɛ = b 4 b 6, 1 = b 8 b 2. The deletion nmber is now β = 10p, and = βs with s = 11(max(p+n+β 2, r)). On inpt β 1 β... l b tag system T C reads track and from row 1 of Table 2 this appends [β 1] bβ 2 w 1 w 2... w n s 11(n+p) β+2 ( ɛ ) p. So T C begins its comptation by appending the encoding of the inpt to C. Reading β 1 β... l b, which has a shift change of β 1, cases s to enter the encoded dataword with a shift of β 1 and this means that we can enter garbage objects with shift β 1 and read the track that appends the encoded inpt. To avoid this we append the word b β 2 to the left of w 1 and since b β 2 has a shift change of 2 the encoded inpt is entered with shift (instead of [β 1]). After reading this b β 2 T C begins the simlation of C on inpt w, making se of the same algorithm as T C. Since we enter the encoding of the inpt word w with shift and objects 0 = b 6 b 4 and 1 = b 8 b 2 now have a shift change of β 10, T C enters objects with shifts of the form [(β 10m + 1)) mod β]. This means that when reading garbage object and objects ɛ, 0, and 1, we enter with shifts of [(β 10m + 1)) mod β], [(β 10m 3)) mod β], [(β 10m 5)) mod β] and [(β 10m 7)) mod β] respectively. This gives the shift vales for the tracks in Table 2. By comparing the tracks in Tables 1 and 2 we can see that the when objects in T C are read they append similar seqences of objects to those in T C. So the comptation of T C proceeds in the same manner as the comptation of T C. However, if C appends α h then we enter 1 with shift [β 6h] and track = [β 6h 4] bcs 1 is read appending the word b s 1. When b s 1 is read dring the next traversal of the dataword the single b in this word cases a shift change of β 1 which means that all sbwords in the dataword of T C will now be entered with an even valed shift. From row 10 of Table 1 all even valed tracks in append only b symbols and so after one frther traversal the dataword consists entirely of b symbols. After this the rle b b, which appends one b and deletes β symbols, is repeated ntil the nmber of symbols is < β and the comptation halts.

9 T. Neary 657 Table 3 Table defining for the cyclic tag system C = 10, 0. In the middle colmn is the seqence of symbols (track) read in when the object in the left colmn is entered with shift (8 4m) mod 8, where α m is a cyclic tag system appendant, 1 = bbbcb, 0 = bbcbb and 0 = bcbb. Object Track read in Vales for m and α m ɛ = bbbb [(8 4m) mod 8] = c10 0 m < 2 [7] = cbbb(bcbbb)c m = 0 [3] = c10 m = 1 0 = bbbb [6] = cbbb(bcbbb)c m = 0 [2] = c10 m = 1 1 = bbbb = 0 c 6 α [5] 0 = 0 = 0 1 α 1 = Example Simlation for T C Using Table 1 to define To help explain how Table 1 is sed to define, we take the example of defining for the cyclic tag system program C = 0, 01. The vale for is given in Eqation (7), where to improve readability, we have split into two eqal length sbwords and with a space between every forth symbol. = = cbcc cbcc cbcc ccbb cccc cbbb cbcc cbbb cbcc ccbb = cbcc cccc cbcc ccbb cbcc ccbb cccc ccbb cbcc cccc (7) From Section 3.1 when C = 0, 01 we have p = 2, s 10, β = 8, = 80, α 0 = 0 and α 1 = 01. By sbstitting these vales into Table 1 we get Table 3 which defines for or tag system that simlates C = 0, 01. Table 3 defines the word as a series of tracks. Recall from Section 2.1 that a track w [z] = w zw z+β w z+2β,..., w z+lβ in a word w is the seqence of symbol read in that word when it is entered with shift z. Here β = 8 and so for m = 0, row 1 of Table 3 defines track [0] = = c 10, which is shown in bold below. = cbcc cbcc cbcc ccbb cccc cbbb cbcc cbbb cbcc ccbb = cbcc cccc cbcc ccbb cbcc ccbb cccc ccbb cbcc cccc Taking row 2 of Table 3 gives [7] = = cbbb(bcbbb)c which again is given in bold immediately below. = cbcc cbcc cbcc ccbb cccc cbbb cbcc cbbb cbcc ccbb = cbcc cccc cbcc ccbb cbcc ccbb cccc ccbb cbcc cccc Rows 3 to 7 of Table 3 give the tracks that complete the definition of for or tag system that simlates the cyclic tag system C = 10, 0. S TAC S

10 658 Undecidability in Binary Tag Systems and the Post Correspondence Problem Simlating a Comptation Step with T C. In this section we give the low level details of or simlation algorithm for T C by simlating the first comptation step (0, , 01 10) of cyclic tag system C = 0, 01 on the inpt dataword 11. The inpt dataword 11 to C is encoded via Definition 7 as the tag system dataword 1 1 and sing 1 = bbbb and Eqation (7) this can be rewritten as { 1 { bbb cbcc cbcc cbcc ccbb cccc {{ cbbb cbcc cbbb cbcc ccbb b 1 (8) Becase the dataword is qite long we only give the left end of the dataword as b and c symbols and se higher level objects on the right. In configration (8) the leftmost symbol is b and so we apply the rle b b by appending b and deleting the leftmost 8 symbols from the dataword to give bcc cbcc ccbb cccc cbbb {{ cbcc cbbb cbcc ccbb b 1 b (9) [5] Above is entered with shift 5 and so we begin reading track from Table 3. We apply [5] the rles b b and c of T C to give the next for comptation steps cbb cccc cbbb cbcc cbbb cbcc ccbb b 1 bb bbb cbcc cbbb cbcc ccbb b 1 bb bbb cbcc ccbb b 1 bbb cbb b 1 bbbb {{ 0 Dring the first 5 comptation steps the word 0 = bbbb was appended to the dataword. Below we give a rewritten form of the configration immediately above where bbbb is replaced with 0 and is replaced with its vale from Eqation (7). We also give the next 5 comptation steps cbb cbcc cccc cbcc ccbb cbcc {{ ccbb cccc ccbb cbcc cccc b ccc b Below we have rewritten the configration given immediately above and given the last configration in this simlated comptation step. ccc b { 1 { bbb cbcc cbcc cbcc ccbb cccc {{ cbbb cbcc cbbb cbcc ccbb b 0 5 (10) 1 [4] {{ bcc cbcc cbcc ccbb cccc {{ cbbb cbcc cbbb cbcc ccbb b 0 6 (11)

11 T. Neary 659 In Eqation (11) above we have finished reading the leftmost 1 in the dataword and completed or simlation of the comptation step (0, , 01 10). The word 0 6 was appended simlating appendant α 0 = 0 from the program C = 0, 01 was appended. From Section 3.1 the sbwords in 6 are considered garbage objects and these sbwords have no effect on the comptation (see first paragraph of Section 3.2). Also, in Eqation (11) we see that the next 1 is entered with shift 4 which encodes that second appendant α 1 = 01 in the program C = 0, 01 is now marked. To see this recall that entering an object with a shift of (β 4m) mod β encodes that appendant α m is marked and since β = 8 we get a shift of 4 when m = 1 meaning α 1 is marked. The dataword in Eqation (11) is of the form given in Eqation (1) and is ready to begin simlation of the next comptations step. 4 The Post Correspondence Problem for 5 Pairs of Words In Theorem 11 we redce the halting problem for the binary tag system given in Lemma 9 to the Post correspondence problem for 5 pairs of words. Definition 10 (Post correspondence problem). Given a set of pairs of words {(r i, v i ) r i, v i Σ, i {0, 1, 2..., n where Σ is a finite alphabet, determine whether or not there exists a non-empty seqence i 1, i 2,... i l, {0, 1, 2..., n sch that r i1 r i2... r il = v i1 v i2... v il. Theorem 11. The Post correspondence problem is ndecidable for 5 pairs of words. Proof. We redce the halting problem for the binary tag systems T C Post correspondence problem instance given by the 5 pairs of words P = {(1, l 10), (10 β 1, 110), (10 β 1, 0), (1, 0), (10 β 1111, 1111) in Lemma 9 to the where ɛ is the empty word and i {b, c. The symbols b and c in T C are encoded as b = 10 β 1 and c = 1 respectively, where β is the deletion nmber of T C. Let r = r i 1 r i2... r il and v = v i1 v i2... v il, where each (r i, v i ) P and r is a prefix of v. We will call the pair (r, v) a configration of P. An arbitrary dataword x 0 x 1... x q b {b, c b is encoded by a P configration of the form (r, v) = (r, r x 0 x 1... x q 10 β ) (12) In each configration (r, v), the nmatched part of v (i.e. x 0 x 1... x q 10 β ) encodes the crrent dataword of T C. Starting from the pair (1, l 10), if 0 = c we add the pair (1, 0) and this matches c = 1 simlating the deletion of 0. If, on the other hand, 0 = b we add the pair (10 β 1, 0) and this matches b = 10 β 1 simlating the deletion of 0. So after matching 0 we have (1 0, l 100). We match β 1 encoded T C symbols in this way to give (r, v) = ( β 2, l 10 β ). The configration is now of the form given in Eqation (12) and the nmatched seqence β 1... l 10 β in v encodes the inpt dataword to T C in Lemma 9. A step of T C on an arbitrary dataword x 0x 1... x q b is of one the two forms: cx 1... x q b x β 1... x q b 1... l b (13) bx 1... x q b x β 1... x q bb (14) These comptation steps are simlated as follows: In Eqation (12), if x 0 = c then x 0 = 1 and we add the pair (1, l 10) to simlate the T C rle c 0... l b, and S TAC S

12 660 Undecidability in Binary Tag Systems and the Post Correspondence Problem this gives (r1, r1 x 1... x q 10 β l 10). In Eqation (12), if x 0 = b then x 0 = 10 β 1 and we add the pair (10 β 1, 110) to simlate the T C rle b b, giving (r10 β 1, r10 β 1 x 1... x q 10 β 110). In both cases we simlate the deletion of a frther β 1 tag system symbols as we did in the previos paragraph to complete the simlated comptation step. So if x 0 = c this gives (r1 x 1... x β 1, r1 x 1... x q 10 β l 10 β ), with the nmatched part in this pair encoding the new dataword on the right of Eqation (13). Or, if x 0 = b we get (r10 β 1 x 1... x β 1, r10 β 1 x 1... x q 10 β 110 β ), with the nmatched part in this pair encoding the new dataword on the right of Eqation (14). The simlated comptation step for both cases is now complete. Now we show that P simlates T C halting with a matching pair of words. Recall that = sβ where we can choose s to be any natral nmber greater than some constant (see Section 3.1). We choose s to be of the form s = x(β 1) + 1 and so the inpt dataword β 1... l b to T C has length xβ(β 1)+1 and the rles either increase its length by xβ(β 1) (rle c 0... l b) or decrease it by β 1 (rle b b), which means all datawords of T C have length y(β 1) + 1, where y N. From Lemma 9, T C halts when the length of its dataword (which has the form b ) is less than the deletion nmber β. So, when T C halts we have y(β 1) + 1 < β which means the dataword is a single b. From Eqation (12), this is encoded as the configration (r, v) = (r, r10 β ). By appending the pair (10 β 1111, 1111) to (r, v), we get the matching pair (r10 β 1111, r10 β 1111) when T C halts. To complete or proof we show that choices that do not follow the simlation as described above leads to a mismatch. We mst have (1, l 10) as the leftmost pair as ptting any other pair from P on the left will not give a match. Now recall that the pair (1, l 10) encodes the initial configration (or inpt) for T C. So now we show that given the encoding of an arbitrary configration any choice that does not follow the simlation leads to a mismatch. From Eqation (12) an arbitrary configration has the form (r, r x 0 x 1... x q 10 β ). If x 0 = b then x 0 = 10 β 1 and we cannot choose either of the pairs (1, l 10) or (1, 0) as they will allow no frther matches, the pair (10 β 1111, 1111) cannot be chosen as for consective 1s do not appear in the encoding (this is becase in we cannot have 2 encoded c symbols ( c = 1) next to each other). The pair (10 β 1, 0) appends a 0 onto the right seqence to give 10 β+1 which cannot be matched as it is only possible to match 0 seqences of the from 10 β 1. Similar argments are sed for the case of x 0 = c and so we do not repeat them. After we have matched x 0 or simlation algorithm reqires that we simlate the deletion of a frther β 1 symbols. If we deviate from the simlation either we find almost immediately that no more matches are possible or we end p with a seqence of zeros that does not have the form 10 β 1 and so cannot be matched. After simlating the deletion of β 1 symbols we have completed the simlation of an arbitrary comptation step and arrived at an encoded configration of the form given by Eqation (12). So it is not possible to find a match in P if we do not follow the simlation described above. Therefore, P has a matching seqence if and only if T C halts. By applying the redctions in [8] and [3] to P in Theorem 11 we get Corollary 12. Corollary 12. The matrix mortality problem is ndecidable for sets with six 3 3 matrices and for sets with two matrices. Acknowledgements: This work is spported by Swiss National Science Fondation grant nmber I wold like to thank Matthew Cook, Damien Woods, Vesa Halava, and Mika Hirvensalo for their comments and discssions.

13 T. Neary 661 References 1 Vincent D. Blondel and John N. Tsitsiklis. When is a pair of matrices mortal? Information Processing Letters, 63(5): , Vincent D. Blondel and John N. Tsitsiklis. A srvey of comptational complexity reslts in systems and control. Atomatica, 36(9): , Jlien Cassaigne and Jhani Karhmäki. Examples of ndecidable problems for 2-generator matrix semigrop. TCS, 204(1-2):29 34, Volker Clas. Some remarks on PCP(k) and related problems. Bll. EATCS, 12:54 61, John Cocke and Marvin Minsky. Universality of tag systems with P = 2. Jornal of the ACM, 11(1):15 20, Matthew Cook. Universality in elementary celllar atomata. Complex Systems, 15(1):1 40, Andrzej Ehrenfecht, Jhani Karhmäki, and Grzegorz Rozenberg. The (generalized) Post correspondence problem with lists consisting of two words is decidable. TCS, 21(2): , Vesa Halava and Tero Harj. Mortality in matrix semigrops. American Mathematical Monthly, 108(7): , Vesa Halava, Tero Harj, and Mika Hirvensalo. Undecidability bonds for integer matrices sing Clas instances. IJFCS, 18(5): , Tero Harj and Marice Margenstern. Splicing systems for niversal Tring machines. In DNA 10, volme 3384 of LNCS, pages Springer, Kristian Lindgren and Mats G. Nordahl. Universal comptation in simple one-dimensional celllar atomata. Complex Systems, 4(3): , Yri Matiyasevich and Gérad Sénizerges. Decision problems for semi-the systems with a few rles. TCS, 330(1): (An earlier version appeared in 11th Annal IEEE Symposim on Logic in Compter Science, LICS 1996".), Marvin Minsky. Recrsive nsolvability of Post s problem of tag" and other topics in theory of Tring machines. Annals of Mathematics, 74(3): , Marvin Minsky. Size and strctre of niversal Tring machines sing tag systems. In Recrsive Fnction Theory: Proceedings, Symposim in Pre Mathematics, volme 5, pages , Provelence, AMS. 15 Trlogh Neary and Damien Woods. P-completeness of celllar atomaton Rle 110. In ICALP 2006, Part I, volme 4051 of LNCS, pages Springer, Michael S. Paterson. Unsolvability in 3 3 matrices. Stdies in Applied Mathematics, 49(1): , Emil L. Post. Formal redctions of the general combinatorial decision problem. American Jornal of Mathematics, 65(2): , Emil L. Post. A variant of a recrsively nsolvable problem. Blletin of The American Mathematical Society, 52: , Raphael M. Robinson. Undecidability and nonperiodicity for tilings of the plane. Inventiones Mathematicae, 12(3): , Yrii Rogozhin. Small niversal Tring machines. TCS, 168(2): , Pal Rothemnd. A DNA and restriction enzyme implementation of Tring machines. In DNA Based Compters, volme 27 of DIMACS, pages AMS, Hao Wang. Tag systems and lag systems. Mathematical Annals, 152:65 74, Damien Woods and Trlogh Neary. On the time complexity of 2-tag systems and small niversal Tring machines. In 47 th Annal IEEE Symposim on Fondations of Compter Science, pages , S TAC S

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Tag Systems and the Complexity of Simple Programs

Tag Systems and the Complexity of Simple Programs Tag Systems and the Complexity of Simple Programs Turlough Neary, Damien Woods To cite this version: Turlough Neary, Damien Woods. Tag Systems and the Complexity of Simple Programs. Jarkko Kari. 21st Workshop

More information

Small polynomial time universal Turing machines

Small polynomial time universal Turing machines Small polynomial time universal Turing machines Turlough Neary Department of Computer Science, NUI Maynooth, Ireland. tneary@cs.may.ie Abstract We present new small polynomial time universal Turing machines

More information

Nonlinear parametric optimization using cylindrical algebraic decomposition

Nonlinear parametric optimization using cylindrical algebraic decomposition Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic

More information

Move Blocking Strategies in Receding Horizon Control

Move Blocking Strategies in Receding Horizon Control Move Blocking Strategies in Receding Horizon Control Raphael Cagienard, Pascal Grieder, Eric C. Kerrigan and Manfred Morari Abstract In order to deal with the comptational brden of optimal control, it

More information

Sign-reductions, p-adic valuations, binomial coefficients modulo p k and triangular symmetries

Sign-reductions, p-adic valuations, binomial coefficients modulo p k and triangular symmetries Sign-redctions, p-adic valations, binomial coefficients modlo p k and trianglar symmetries Mihai Prnesc Abstract According to a classical reslt of E. Kmmer, the p-adic valation v p applied to a binomial

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc A New Architectre for a Parallel Finite Field Mltiplier with Low Complexity Based on Composite Fields Christof Paar y IEEE Transactions on Compters, Jly 996, vol 45, no 7, pp 856-86 Abstract In this paper

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca

More information

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on . Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers On the circit complexity of the standard and the Karatsba methods of mltiplying integers arxiv:1602.02362v1 [cs.ds] 7 Feb 2016 Igor S. Sergeev The goal of the present paper is to obtain accrate estimates

More information

Four Small Universal Turing Machines

Four Small Universal Turing Machines Fundamenta Informaticae 91 (2009) 105 126 105 DOI 10.3233/FI-2009-0008 IOS Press Four Small Universal Turing Machines Turlough Neary Boole Centre for Research in Informatics, University College Cork, Ireland.

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

On oriented arc-coloring of subcubic graphs

On oriented arc-coloring of subcubic graphs On oriented arc-coloring of sbcbic graphs Alexandre Pinlo Alexandre.Pinlo@labri.fr LaBRI, Université Bordeax I, 351, Cors de la Libération, 33405 Talence, France Janary 17, 2006 Abstract. A homomorphism

More information

Chapter 2 Introduction to the Stiffness (Displacement) Method. The Stiffness (Displacement) Method

Chapter 2 Introduction to the Stiffness (Displacement) Method. The Stiffness (Displacement) Method CIVL 7/87 Chater - The Stiffness Method / Chater Introdction to the Stiffness (Dislacement) Method Learning Objectives To define the stiffness matrix To derive the stiffness matrix for a sring element

More information

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte

More information

Complexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups

Complexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups Complexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups Paul C. Bell Department of Computer Science Loughborough University P.Bell@lboro.ac.uk Co-authors for todays topics: V.

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal

More information

International Journal of Physical and Mathematical Sciences journal homepage:

International Journal of Physical and Mathematical Sciences journal homepage: 64 International Jornal of Physical and Mathematical Sciences Vol 2, No 1 (2011) ISSN: 2010-1791 International Jornal of Physical and Mathematical Sciences jornal homepage: http://icoci.org/ijpms PRELIMINARY

More information

We automate the bivariate change-of-variables technique for bivariate continuous random variables with

We automate the bivariate change-of-variables technique for bivariate continuous random variables with INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,

More information

Sareban: Evaluation of Three Common Algorithms for Structure Active Control

Sareban: Evaluation of Three Common Algorithms for Structure Active Control Engineering, Technology & Applied Science Research Vol. 7, No. 3, 2017, 1638-1646 1638 Evalation of Three Common Algorithms for Strctre Active Control Mohammad Sareban Department of Civil Engineering Shahrood

More information

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Jornal of the Korean Statistical Society 2007, 36: 4, pp 543 556 QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Hosila P. Singh 1, Ritesh Tailor 2, Sarjinder Singh 3 and Jong-Min Kim 4 Abstract In sccessive

More information

P systems based on tag operations

P systems based on tag operations Computer Science Journal of Moldova, vol.20, no.3(60), 2012 P systems based on tag operations Yurii Rogozhin Sergey Verlan Abstract In this article we introduce P systems using Post s tag operation on

More information

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls Hindawi Pblishing Corporation Discrete Dynamics in Natre and Society Volme 2008 Article ID 149267 8 pages doi:101155/2008/149267 Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis

More information

A Model-Free Adaptive Control of Pulsed GTAW

A Model-Free Adaptive Control of Pulsed GTAW A Model-Free Adaptive Control of Plsed GTAW F.L. Lv 1, S.B. Chen 1, and S.W. Dai 1 Institte of Welding Technology, Shanghai Jiao Tong University, Shanghai 00030, P.R. China Department of Atomatic Control,

More information

Experimental Study of an Impinging Round Jet

Experimental Study of an Impinging Round Jet Marie Crie ay Final Report : Experimental dy of an Impinging Rond Jet BOURDETTE Vincent Ph.D stdent at the Rovira i Virgili University (URV), Mechanical Engineering Department. Work carried ot dring a

More information

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions OR Spectrm 06 38:53 540 DOI 0.007/s009-06-043-5 REGULAR ARTICLE Worst-case analysis of the LPT algorithm for single processor schedling with time restrictions Oliver ran Fan Chng Ron Graham Received: Janary

More information

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introdction The transmission line eqations are given by, I z, t V z t l z t I z, t V z, t c z t (1) (2) Where, c is the per-nit-length

More information

Concepts Introduced. Digital Electronics. Logic Blocks. Truth Tables

Concepts Introduced. Digital Electronics. Logic Blocks. Truth Tables Concepts Introdced Digital Electronics trth tables, logic eqations, and gates combinational logic seqential logic Digital electronics operate at either high or low voltage. Compters se a binary representation

More information

APPLICATION OF MICROTREMOR MEASUREMENTS TO EARTHQUAKE ENGINEERING

APPLICATION OF MICROTREMOR MEASUREMENTS TO EARTHQUAKE ENGINEERING 170 APPLICATION OF MICROTREMOR MEASUREMENTS TO EARTHQUAKE ENGINEERING I. M. Parton* and P. W. Taylor* INTRODUCTION Two previos papers pblished in this Blletin (Refs 1, 2) described the methods developed

More information

A State Space Based Implicit Integration Algorithm. for Differential Algebraic Equations of Multibody. Dynamics

A State Space Based Implicit Integration Algorithm. for Differential Algebraic Equations of Multibody. Dynamics A State Space Based Implicit Integration Algorithm for Differential Algebraic Eqations of Mltibody Dynamics E. J. Hag, D. Negrt, M. Ianc Janary 28, 1997 To Appear Mechanics of Strctres and Machines Abstract.

More information

The spreading residue harmonic balance method for nonlinear vibration of an electrostatically actuated microbeam

The spreading residue harmonic balance method for nonlinear vibration of an electrostatically actuated microbeam J.L. Pan W.Y. Zh Nonlinear Sci. Lett. Vol.8 No. pp.- September The spreading reside harmonic balance method for nonlinear vibration of an electrostatically actated microbeam J. L. Pan W. Y. Zh * College

More information

The Lehmer matrix and its recursive analogue

The Lehmer matrix and its recursive analogue The Lehmer matrix and its recrsive analoge Emrah Kilic, Pantelimon Stănică TOBB Economics and Technology University, Mathematics Department 0660 Sogtoz, Ankara, Trkey; ekilic@etedtr Naval Postgradate School,

More information

Development of Second Order Plus Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model

Development of Second Order Plus Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model Development of Second Order Pls Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model Lemma D. Tfa*, M. Ramasamy*, Sachin C. Patwardhan **, M. Shhaimi* *Chemical Engineering Department, Universiti

More information

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical

More information

System identification of buildings equipped with closed-loop control devices

System identification of buildings equipped with closed-loop control devices System identification of bildings eqipped with closed-loop control devices Akira Mita a, Masako Kamibayashi b a Keio University, 3-14-1 Hiyoshi, Kohok-k, Yokohama 223-8522, Japan b East Japan Railway Company

More information

Study of the diffusion operator by the SPH method

Study of the diffusion operator by the SPH method IOSR Jornal of Mechanical and Civil Engineering (IOSR-JMCE) e-issn: 2278-684,p-ISSN: 2320-334X, Volme, Isse 5 Ver. I (Sep- Oct. 204), PP 96-0 Stdy of the diffsion operator by the SPH method Abdelabbar.Nait

More information

Advanced topics in Finite Element Method 3D truss structures. Jerzy Podgórski

Advanced topics in Finite Element Method 3D truss structures. Jerzy Podgórski Advanced topics in Finite Element Method 3D trss strctres Jerzy Podgórski Introdction Althogh 3D trss strctres have been arond for a long time, they have been sed very rarely ntil now. They are difficlt

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Simplified Identification Scheme for Structures on a Flexible Base

Simplified Identification Scheme for Structures on a Flexible Base Simplified Identification Scheme for Strctres on a Flexible Base L.M. Star California State University, Long Beach G. Mylonais University of Patras, Greece J.P. Stewart University of California, Los Angeles

More information

Multi-Voltage Floorplan Design with Optimal Voltage Assignment

Multi-Voltage Floorplan Design with Optimal Voltage Assignment Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy

More information

Elements of Coordinate System Transformations

Elements of Coordinate System Transformations B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Robust Tracking and Regulation Control of Uncertain Piecewise Linear Hybrid Systems

Robust Tracking and Regulation Control of Uncertain Piecewise Linear Hybrid Systems ISIS Tech. Rept. - 2003-005 Robst Tracking and Reglation Control of Uncertain Piecewise Linear Hybrid Systems Hai Lin Panos J. Antsaklis Department of Electrical Engineering, University of Notre Dame,

More information

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

Convergence analysis of ant colony learning

Convergence analysis of ant colony learning Delft University of Technology Delft Center for Systems and Control Technical report 11-012 Convergence analysis of ant colony learning J van Ast R Babška and B De Schtter If yo want to cite this report

More information

Remarks on strongly convex stochastic processes

Remarks on strongly convex stochastic processes Aeqat. Math. 86 (01), 91 98 c The Athor(s) 01. This article is pblished with open access at Springerlink.com 0001-9054/1/010091-8 pblished online November 7, 01 DOI 10.1007/s00010-01-016-9 Aeqationes Mathematicae

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

Complexity of the Cover Polynomial

Complexity of the Cover Polynomial Complexity of the Coer Polynomial Marks Bläser and Holger Dell Comptational Complexity Grop Saarland Uniersity, Germany {mblaeser,hdell}@cs.ni-sb.de Abstract. The coer polynomial introdced by Chng and

More information

Constructive Root Bound for k-ary Rational Input Numbers

Constructive Root Bound for k-ary Rational Input Numbers Constrctive Root Bond for k-ary Rational Inpt Nmbers Sylvain Pion, Chee Yap To cite this version: Sylvain Pion, Chee Yap. Constrctive Root Bond for k-ary Rational Inpt Nmbers. 19th Annal ACM Symposim on

More information

Fine granularity sparse QR factorization for multicore based systems

Fine granularity sparse QR factorization for multicore based systems Fine granlarity sparse QR factorization for mlticore based systems Alfredo Bttari CNRS-IRIT, 118 rote de Narbonne, F-31062 Tolose, France alfredo.bttari@irit.fr Abstract. The advent of mlticore processors

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

Curves - Foundation of Free-form Surfaces

Curves - Foundation of Free-form Surfaces Crves - Fondation of Free-form Srfaces Why Not Simply Use a Point Matrix to Represent a Crve? Storage isse and limited resoltion Comptation and transformation Difficlties in calclating the intersections

More information

1. State-Space Linear Systems 2. Block Diagrams 3. Exercises

1. State-Space Linear Systems 2. Block Diagrams 3. Exercises LECTURE 1 State-Space Linear Sstems This lectre introdces state-space linear sstems, which are the main focs of this book. Contents 1. State-Space Linear Sstems 2. Block Diagrams 3. Exercises 1.1 State-Space

More information

Differentiation of Exponential Functions

Differentiation of Exponential Functions Differentiation of Eponential Fnctions The net derivative rles that o will learn involve eponential fnctions. An eponential fnction is a fnction in the form of a constant raised to a variable power. The

More information

Cuckoo hashing: Further analysis

Cuckoo hashing: Further analysis Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,

More information

Solvability of the halting and reachability problem for binary 2-tag systems

Solvability of the halting and reachability problem for binary 2-tag systems Fundamenta Informaticae XX (200) 37 IOS Press Solvability of the halting and reachability problem for binary 2-tag systems Liesbeth De Mol Centre for Logic and Philosophy of Science Gent University Blandijnberg

More information

OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIELD OF A POLYHEDRAL BODY WITH LINEARLY INCREASING DENSITY 1

OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIELD OF A POLYHEDRAL BODY WITH LINEARLY INCREASING DENSITY 1 OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIEL OF A POLYHERAL BOY WITH LINEARLY INCREASING ENSITY 1 V. POHÁNKA2 Abstract The formla for the comptation of the gravity field of a polyhedral body

More information

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability

More information

Lewis number and curvature effects on sound generation by premixed flame annihilation

Lewis number and curvature effects on sound generation by premixed flame annihilation Center for Trblence Research Proceedings of the Smmer Program 2 28 Lewis nmber and crvatre effects on sond generation by premixed flame annihilation By M. Talei, M. J. Brear AND E. R. Hawkes A nmerical

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;

More information

Optimal Control, Statistics and Path Planning

Optimal Control, Statistics and Path Planning PERGAMON Mathematical and Compter Modelling 33 (21) 237 253 www.elsevier.nl/locate/mcm Optimal Control, Statistics and Path Planning C. F. Martin and Shan Sn Department of Mathematics and Statistics Texas

More information

EVALUATION OF GROUND STRAIN FROM IN SITU DYNAMIC RESPONSE

EVALUATION OF GROUND STRAIN FROM IN SITU DYNAMIC RESPONSE 13 th World Conference on Earthqake Engineering Vancover, B.C., Canada Agst 1-6, 2004 Paper No. 3099 EVALUATION OF GROUND STRAIN FROM IN SITU DYNAMIC RESPONSE Ellen M. RATHJE 1, Wen-Jong CHANG 2, Kenneth

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

Discussion Papers Department of Economics University of Copenhagen

Discussion Papers Department of Economics University of Copenhagen Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,

More information

Effects of Soil Spatial Variability on Bearing Capacity of Shallow Foundations

Effects of Soil Spatial Variability on Bearing Capacity of Shallow Foundations Geotechnical Safety and Risk V T. Schweckendiek et al. (Eds.) 2015 The athors and IOS Press. This article is pblished online with Open Access by IOS Press and distribted nder the terms of the Creative

More information

Analytical Value-at-Risk and Expected Shortfall under Regime Switching *

Analytical Value-at-Risk and Expected Shortfall under Regime Switching * Working Paper 9-4 Departamento de Economía Economic Series 14) Universidad Carlos III de Madrid March 9 Calle Madrid, 16 893 Getafe Spain) Fax 34) 91649875 Analytical Vale-at-Risk and Expected Shortfall

More information

Theoretical and Experimental Implementation of DC Motor Nonlinear Controllers

Theoretical and Experimental Implementation of DC Motor Nonlinear Controllers Theoretical and Experimental Implementation of DC Motor Nonlinear Controllers D.R. Espinoza-Trejo and D.U. Campos-Delgado Facltad de Ingeniería, CIEP, UASLP, espinoza trejo dr@aslp.mx Facltad de Ciencias,

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

DEPTH CONTROL OF THE INFANTE AUV USING GAIN-SCHEDULED REDUCED-ORDER OUTPUT FEEDBACK 1. C. Silvestre A. Pascoal

DEPTH CONTROL OF THE INFANTE AUV USING GAIN-SCHEDULED REDUCED-ORDER OUTPUT FEEDBACK 1. C. Silvestre A. Pascoal DEPTH CONTROL OF THE INFANTE AUV USING GAIN-SCHEDULED REDUCED-ORDER OUTPUT FEEDBACK 1 C. Silvestre A. Pascoal Institto Sperior Técnico Institte for Systems and Robotics Torre Norte - Piso 8, Av. Rovisco

More information

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS ( < 20) AND CONSEQUENCES ON CRITICALITY SAFETY N. Leclaire, S. Evo, I.R.S.N., France Introdction In criticality stdies, the blk density

More information

New Multi-User OFDM Scheme: Braided Code Division Multiple Access

New Multi-User OFDM Scheme: Braided Code Division Multiple Access New Mlti-User Scheme: Braided Code Division Mltiple Access Marcos B.S. Tavares, Michael Lentmaier, Kamil Sh. Zigangirov and Gerhard. Fettweis Vodafone Chair Mobile Commnications Systems, Technische Universität

More information

Konyalioglu, Serpil. Konyalioglu, A.Cihan. Ipek, A.Sabri. Isik, Ahmet

Konyalioglu, Serpil. Konyalioglu, A.Cihan. Ipek, A.Sabri. Isik, Ahmet The Role of Visalization Approach on Stdent s Conceptal Learning Konyaliogl, Serpil Department of Secondary Science and Mathematics Edcation, K.K. Edcation Faclty, Atatürk University, 25240- Erzrm-Trkey;

More information

Solving a System of Equations

Solving a System of Equations Solving a System of Eqations Objectives Understand how to solve a system of eqations with: - Gass Elimination Method - LU Decomposition Method - Gass-Seidel Method - Jacobi Method A system of linear algebraic

More information

PhysicsAndMathsTutor.com

PhysicsAndMathsTutor.com C Integration - By sbstittion PhysicsAndMathsTtor.com. Using the sbstittion cos +, or otherwise, show that e cos + sin d e(e ) (Total marks). (a) Using the sbstittion cos, or otherwise, find the eact vale

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields.

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields. Kraskopf, B, Lee,, & Osinga, H (28) odimension-one tangency bifrcations of global Poincaré maps of for-dimensional vector fields Early version, also known as pre-print Link to pblication record in Explore

More information

(Diskursrepräsentationstheorie)

(Diskursrepräsentationstheorie) (Diskrsrepräsentationstheorie) 3.1 Preliminaries 3.2 DRS Constrction After we have seen how DRT is intended to work we will have a closer look at its precise formlation. In this section we will treat the

More information

Pulses on a Struck String

Pulses on a Struck String 8.03 at ESG Spplemental Notes Plses on a Strck String These notes investigate specific eamples of transverse motion on a stretched string in cases where the string is at some time ndisplaced, bt with a

More information

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS 3. System Modeling Mathematical Modeling In designing control systems we mst be able to model engineered system dynamics. The model of a dynamic system

More information

Graph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation

Graph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation Graph-Modeled Data Clstering: Fied-Parameter Algorithms for Cliqe Generation Jens Gramm Jiong Go Falk Hüffner Rolf Niedermeier Wilhelm-Schickard-Institt für Informatik, Universität Tübingen, Sand 13, D-72076

More information

Graphs and Their. Applications (6) K.M. Koh* F.M. Dong and E.G. Tay. 17 The Number of Spanning Trees

Graphs and Their. Applications (6) K.M. Koh* F.M. Dong and E.G. Tay. 17 The Number of Spanning Trees Graphs and Their Applications (6) by K.M. Koh* Department of Mathematics National University of Singapore, Singapore 1 ~ 7543 F.M. Dong and E.G. Tay Mathematics and Mathematics EdOOation National Institte

More information

Two Phase Flow Analysis in Electro-Chemical Machining using CFD

Two Phase Flow Analysis in Electro-Chemical Machining using CFD Two Phase Flow Analysis in Electro-Chemical Machining sing CFD 1 Usharani Rath, 2 Chandan Kmar Biswas 1,2 Department of Mechanical Engineering, National Institte of Technology, Rorkela, 769008, India e-mail:

More information

Scheduling parallel jobs to minimize the makespan

Scheduling parallel jobs to minimize the makespan J Sched (006) 9:433 45 DOI 10.1007/s10951-006-8497-6 Schedling parallel jobs to minimize the makespan Berit Johannes C Springer Science + Bsiness Media, LLC 006 Abstract We consider the NP-hard problem

More information

Gravitational Instability of a Nonrotating Galaxy *

Gravitational Instability of a Nonrotating Galaxy * SLAC-PUB-536 October 25 Gravitational Instability of a Nonrotating Galaxy * Alexander W. Chao ;) Stanford Linear Accelerator Center Abstract Gravitational instability of the distribtion of stars in a galaxy

More information

Restricted Three-Body Problem in Different Coordinate Systems

Restricted Three-Body Problem in Different Coordinate Systems Applied Mathematics 3 949-953 http://dx.doi.org/.436/am..394 Pblished Online September (http://www.scirp.org/jornal/am) Restricted Three-Body Problem in Different Coordinate Systems II-In Sidereal Spherical

More information

A polynomial expansion to approximate the ultimate ruin probability in the compound Poisson ruin model

A polynomial expansion to approximate the ultimate ruin probability in the compound Poisson ruin model A polynomial expansion to approximate the ltimate rin probability in the compond Poisson rin model - Pierre-Olivier GOFFARD (Université de Aix-Marseille, AXA France) - Stéphane LOISEL (Université Lyon

More information

A Note on Irreducible Polynomials and Identity Testing

A Note on Irreducible Polynomials and Identity Testing A Note on Irrecible Polynomials an Ientity Testing Chanan Saha Department of Compter Science an Engineering Inian Institte of Technology Kanpr Abstract We show that, given a finite fiel F q an an integer

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond

More information

MODELLING OF TURBULENT ENERGY FLUX IN CANONICAL SHOCK-TURBULENCE INTERACTION

MODELLING OF TURBULENT ENERGY FLUX IN CANONICAL SHOCK-TURBULENCE INTERACTION MODELLING OF TURBULENT ENERGY FLUX IN CANONICAL SHOCK-TURBULENCE INTERACTION Rssell Qadros, Krishnend Sinha Department of Aerospace Engineering Indian Institte of Technology Bombay Mmbai, India 476 Johan

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

Mathematical Models of Physiological Responses to Exercise

Mathematical Models of Physiological Responses to Exercise Mathematical Models of Physiological Responses to Exercise Somayeh Sojodi, Benjamin Recht, and John C. Doyle Abstract This paper is concerned with the identification of mathematical models for physiological

More information

Decision making is the process of selecting

Decision making is the process of selecting Jornal of Advances in Compter Engineering and Technology, (4) 06 A New Mlti-Criteria Decision Making Based on Fzzy- Topsis Theory Leila Yahyaie Dizaji, Sohrab khanmohammadi Received (05-09-) Accepted (06--)

More information